Hi, Stephane. I cannot agree with you any more. However, with regard to “the lying resolver” you’ve mentioned, to make it clearer, I’d like to bring in the Cache Poisoning which IPsec and TSIG cannot protect against. In practice, the response form the intended recursive server is in the form of plaintext. Once a recursive server has been hacked by the cache poisoning attack, the IPSec or the TSIG is to actually guarantee integrity and authentication of the “fake response”. And it needs to be pointed out that a poisoning attack on a single ISP DNS recursive server can affect numerous users serviced directly by the compromised server or indirectly by its downstream server(s) if applicable. To give a countermeasure, the response from a recursive sever might as well be cached in form of both plaintext and ciphertext which is generated by the very recursive server. That’s to say, once a certain DNS resource record arrives from an authoritative name-server, the recursive sever should encrypt the DNS response and then cache it right away before the potential cache poisoning attack. If the data exchanged between local recursive server and authoritative name-server is secured by DNSSEC, a similar course should be followed by the recursive sever right after the DNSSEC verification. Once the requester, a PC typically, gets the response in dual forms, it can then verify the correlation between them. If so, even the attacker has poisoned the DNS information cache, yet the two forms of poisoned cache, plaintext and ciphertext, could not be in accordance with each other. Consequently, the verification to them by a requester will never pass and then the phishing would be avoided. With respect to the generation and the distribution of the key for the ciphertext mentioned above, further deliberation is needed. Any critical will be appreciated.
2009-04-30 madi 发件人: Stephane Bortzmeyer 发送时间: 2009-04-23 19:40:15 收件人: Scott Rose 抄送: m...@cnnic.cn; dnsop 主题: Re: dns data exchanged between host and local dns-sever On Thu, Apr 23, 2009 at 07:10:13AM -0400, Scott Rose <sco...@nist.gov > wrote a message of 65 lines which said: >>Those are the DNS protocol mechanisms in place. There is also lower >>level security technologies such as IPsec that could be used between >>stub clients and recursive servers that don't rely on DNSSEC at all. >TSIG, IPsec and friends have all the same issue: they check that the >response does come from the intended resolver, not that the response >is authentic. At a time where any hotel provides Internet access with >a lying resolver, this is probably not sufficient.
_______________________________________________ DNSOP mailing list DNSOP@ietf.org https://www.ietf.org/mailman/listinfo/dnsop